1. Security Program (NICE) Workforce Framework
1.1. Analyze
1.2. Collect and Operate
1.3. Investigate
1.4. Operate and Maintain
1.5. Oversee and Govern
1.6. Protect and Defend
1.7. Securely Provision
2. Leadership Team
2.1. CEO
2.1.1. Chief Information Security Officer (CISO) or CSO
2.1.1.1. Access Management
2.1.1.1.1. Access Management Specialist
2.1.1.1.2. Access Management Administrator
2.1.1.2. Security Architecture
2.1.1.2.1. Security Architect
2.1.1.3. Security Engineering
2.1.1.3.1. Application Security Engineer
2.1.1.3.2. Cryptographer/Encryption Engineer
2.1.1.3.3. Database Security Engineer
2.1.1.3.4. Identity and Access Management Engineer
2.1.1.3.5. Mainframe Security Engineer
2.1.1.3.6. Network Security Engineer
2.1.1.3.7. Unix Security Engineer
2.1.1.3.8. Windows Security Engineer
2.1.1.4. Security Operations Director
2.1.1.4.1. Firewall Administrator/Analyst
2.1.1.4.2. Intrusion Detection Analyst
2.1.1.4.3. Penetration Tester
2.1.1.4.4. Security Administrator
2.1.1.4.5. Security Operations Analyst (Level 1)
2.1.1.4.6. Threat Intelligence Analyst
2.1.1.4.7. Virtual Patch Management Analyst
2.1.1.4.8. Vulnerability Analyst
2.1.2. Privacy Officer
2.2. Chief Information Officer (CIO)
2.3. Digital Risk Officer (DRO)
2.3.1. Director of Risk and Compliance
2.3.1.1. Manager of Risk and Compliance
2.3.1.1.1. Risk Analyst
2.3.1.1.2. Security Auditor
3. Security Program Stages
3.1. Stage 1
3.1.1. Initial
3.1.1.1. Policy Development
3.1.1.2. Standards Development
3.1.1.3. Employee Education
3.2. Stage 2
3.2.1. Architecting
3.2.1.1. Architectural Review
3.2.1.2. Audit
3.2.1.3. Compliance Assessment
3.3. Stage 3
3.3.1. Building
3.3.1.1. Risk Management
3.3.1.2. Security Operations
3.3.1.3. Best of Breed
3.3.1.4. Standalone Product Preference
3.4. Stage 4
3.4.1. Operating
3.4.1.1. Solution Preference
3.4.1.2. Security Product Rationalization
3.4.1.3. Solution Suite Product Preference
3.4.1.4. Threat Response Focus
3.5. Stage 5
3.5.1. Optimizing
3.5.1.1. Managing Security Risks
3.5.1.2. Managing Compliance Risks
3.5.1.3. Threat Hunting
3.5.1.4. Managing Threat Handling